Security challenges of cloud computing
Upcoming SlideShare
Loading in...5
×
 

Security challenges of cloud computing

on

  • 298 views

Major security challenges or threat of cloud computing.

Major security challenges or threat of cloud computing.

Statistics

Views

Total Views
298
Views on SlideShare
296
Embed Views
2

Actions

Likes
0
Downloads
27
Comments
0

1 Embed 2

http://192.168.6.179 2

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Security challenges of cloud computing Security challenges of cloud computing Presentation Transcript

  • MD. Hasibur Rashid Computer Science and Engineering, Patuakhali Science and Technology University, Bangladesh.
  • When hackers overflows a network server or web server with frequent request of services to damage the network, the denial of service cannot keep up with them, server could not legitimate client regular requests. For example a hacker hijacks the web server that could stop the functionality of the web server from providing the services. In cloud computing, hacker attack on the server by sending thousands of requests to the server that server is unable to respond to the regular clients in this way server will not work properly. Counter measure for this attack is to reduce the privileges of the user that connected to a server. This will help to reduce the DOS attack.
  • This is another issue of network security that will happen if secure socket layer (SSL) is not properly configured. For example if two parties are communicating with each other and SSL is not properly installed then all the data communication between two parties could be hack by the middle party. Counter measure for this attack is SSL should properly install and it should check before communication with other authorized parties. View slide
  • Another type of attack is network sniffer, it is a more critical issue of network security in which unencrypted data are hacked through network for example an attacker can hack passwords that are not properly encrypted during communication. If the communication parties not used encryption techniques for data security then attacker can capture the data during transmission as a third party. Counter measure for this attack is parties should used encryption methods for securing there data. View slide
  • There may be some issues regarding port scanning that could be used by an attacker as Port 80(HTTP) is always open that is used for providing the web services to the user. Other ports such as 21(FTP) etc are not opened all the time it will open when needed therefore ports should be secured by encrypted until and unless the server software is configured properly. Counter measure for this attack is that firewall is used to secure the data from port attacks.
  • SQL injection attacks are the attacks where a hackers uses the special characters to return the data for example in SQL scripting the query end up with where clause that may be modified by adding more information in it. For example an argument value of variable y or 1==1 may cause the return of full table because 1==1is always seems to be true.
  • It is a type of attack in which user enters right URL of a website and hacker on the other site redirect the user to its own website and hack its credentials. For example user entered the URL in address bar and attacker redirects the user to hacker site and then he will obtain the sensitive data of the user. Cross site scripting attacks can provide the way to buffer overflows, DOS attacks and inserting spiteful software in to the web browsers for violation of user’s credentials.
  • One of the top threats to cloud computing is data breaches. All the computer systems connected to the Internet can be accessed by virtually any person. This exposes cloud computing service providers to the threat of skilled hackers with malicious intentions. In 2012 the number of reported cases of server breaches was over 200 and they resulted in the loss of about 9 million data records. More and more breaches are expected as the number of national (and international, as we’ve witnessed with China) underground hacking communities continues to grow.
  • Another serious threat stems from cloud computing service providers’ potential inability to prevent data loss. In our plugged in world, most people know that loss of data is inevitable at one point or another. However, this threat is compounded by the sheer amount of data handled by cloud computing service providers. There is increasing amount of sensitive data relayed to cloud computing firms and this data could get lost in any number of ways, including through accidental deletion or corruption.
  • Hijacking of accounts at cloud computing companies is another potentially serious threat. It is usually possible for authorized company personnel to remotely access cloud data via mobile devices or remote computers. “The potential for account hijacking, or data hijacking, increases when employees are accessing sensitive information via remote platforms that don’t necessarily have the security mechanisms in place that would otherwise exist at a workstation computer,” notes Tom Caper from Texas based Microsoft Dynamics Partner.
  • MD. Hasibur Rashid Computer Science and Engineering, Patuakhali Science and Technology University, Bangladesh.